2011 International Conference on Signal, Image Processing and Applications With workshop of ICEEA 2011 IPCSIT vol.21 (2011) © (2011) IACSIT Press, Singapore An Overview of Hardware Implementation for Digital Image Watermarking Mustafa Osman Ali 1 and Rameshwar Rao 2 Department of Electronics and Communication Engineering, College of Engineering, Osmania University, Hyderabad, India 1 E-mail: elexman93@gmail.com , 2 E-mail: Rameshwar_rao@hotmail.com Abstract. The increasing amount of applications using digital multimedia technologies has accentuated the need to provide copyright protection to multimedia data. This paper reviews watermarking techniques, by focusing on the hardware based implementation of digital image watermarking. Digital watermarking is an authentication method that has received a lot of attention in the past few years. Through this paper we will survey some digital image watermarking schemes which have been implemented by using hardware techniques. Also the study shows the similarities and differences between different types and then assesses the benefits gained from the use of this technology. Keywords: base-image, DCT, DWT, fragile, invisible, robust, spatial domain, visible, watermark. 1. Introduction Within the fast increasing developments of the internet in the recent years, a parallel developments in the need to create, copy, transmit, and distribute digital data especially multimedia (images, audio, and video) has also increased. Therefore authors are worried to distribute their work in fear that it may be used illegally through proliferation of the World Wide Web (WWW). Consequently, this has led to a strong demand for reliable and secure copyright protection techniques for digital data. There are three basic methods of secure communication available, namely, cryptography, Steganography and watermarking [1]. Among these three, the first one, cryptography, deals with the development of techniques for converting information between intelligible and unintelligible forms during information exchange that deals with the content confidentiality and access control. By using cryptography, only authorized parties holding decryption keys can access the content (text or image). It provides the tools to secure sensitive information. Steganography, on the other hand, is a technique for hiding and extracting information to be conveyed using a carrier signal. The third one, watermarking is a means of developing proper techniques for hiding proprietary information in the perceptual data. 2. Digital Watermarking Digital watermarking is applied for copyright protection, content authentication, detection of illegal duplication and alteration, feature tagging and secret communication. Digital watermarking is used in the hiding of a secret message or information within an ordinary message and its extraction at its destination. The secret message embedded as watermark can be almost anything, for example: a serial number, plain text, image, etc. In general, digital watermarking involves two major operations: (i) Watermark embedding, and (ii) Watermark extraction. For both operations a secret key is needed to secure the watermark [1-5]. The keys in watermarking algorithms can be applied in the cryptographic mechanisms to provide more secure services to copy right protection. The most important properties of any digital watermarking techniques are robustness, security, imperceptibility, complexity, and verification [1-4]. Robustness is defined as if the watermark can be detected after media operations such as filtering, lossy compression, color correction, or geometric 90 modifications. Security means that the embedded watermark can’t be removed beyond reliable detection by targeted attacks. Imperceptibility means that the watermark is not seen by the human visual system. Complexity is described as the effort and time required for watermark embedding and retrieval. Lastly, verification is a procedure whereby is used as a private key or public key function. Each of these properties must be taken into consideration when applying a certain digital watermarking technique [3]. Watermarking techniques can be classified according to the nature of data (text, image, audio or video), or according to the working (spatial or frequency) domain, also they can be classified according to the human perception (robust or fragile) [4]. In images, the watermarking techniques can be broadly classified into three types: (i) Visible watermark, (ii) Invisible fragile watermark and (iii) Invisible robust watermark [3,4], which has wider currency and use. However all these mentioned classes can be applied by using software, hardware or both together. 3. Hardware Versus Software A watermarking system can be implemented with either software or hardware. The software implementation of the watermarking algorithms is significantly large, whereas the hardware implementation of the algorithms is lacking [6]. In a software implementation, the algorithm’s operations are performed as code running on a microprocessor [7]. This code should be stored in a memory e.g. RAM and require a dedicated processor that occupies more area, consumes significantly more power, and may still not perform adequately fast. The authors of [7] believe that software-based watermarking provides the following: • Abstraction of the implementation from any hardware details. • Availability of software tools to aid in realizing various data operations. • Limited means of improving area and improving time complexity (speed) of the implementation. Although it might be faster to implement an algorithm in software, there are a few compelling reasons for a move toward hardware implementation. In a hardware implementation the algorithm’s operations are fully implemented in custom-designed circuitry. This investigates great advantages such as reduce hardware scheme area, decrease power consumption and increase speed of performance [6-9]. Therefore a hardware watermarking solution are often more economical. 4. Spatial Domain Versus Frequency Domain A watermarking scheme can be implemented in either spatial domain or frequency domain. The most straightforward fundamental schemes for the fields of digital watermarking are watermarking in the spatial domain. This technique has started long time ago by designing the embedding and extraction algorithms to modify the luminance values of the pixels in the spatial domain. The most common simplest watermarking technique in the spatial domain is done by manipulating the Least Significant Bit (LSB) overall pixels. The watermark to be embedded is placed in the LSB of the base-image. Spatial domain is less complex as no transform is used, but isn’t robust against attacks [3-5]. For better imperceptibility as well as robustness, the insertion of the watermark is done in a frequency domain. Many transform formats are available; mainly Discrete Cosine Transform (DCT) and Discrete Wavelet Transform (DWT) are widely used. In this technique (Frequency Domain) the watermark actually spread throughout the image, not just operating on an individual pixel. Wavelet-based watermarking methods exploit the frequency information and spatial information of the transformed data in multiple resolutions to gain robustness. DWT is closer to the Human Visual System (HVS) since it splits the input image into several frequency bands that can be processed independently. It’s a multi-resolution transform that permits to locate image features such as smooth areas, edges or textured areas [3,4]. DWT based implementation needs to store results at each level of computation, so the memory requirement increases. This is one of the reasons for higher area requirement compared to DCT based approaches [10]. Generally, hardware watermarking scheme can be done by using each of the domains (spatial or frequency). But due to the simplicity of spatial domain computational overhead and its easiness for its application if compared to the frequency domain, the spatial domain is usually preferred for hardware implementation [5, 6, 8, 9]. 91 5. Hardware Digital Image Watermarking Schemes Any digital watermarking scheme requires two algorithms; embedding algorithm and extraction algorithm. Embedding algorithm acts as an encoder in hardware applications, while extraction algorithm represents a decoder. All the authors who were mentioned through this survey highlighted the (embedding and/or extraction) algorithms in the beginning of their works with full details due to the importance of these algorithms in which they are the backbones of their works. Most of the authors have taken ready algorithms made by others to be converted to hardware schemes. However, few authors have recommended their own algorithms and then converted to the hardware applications. Since the interest of this survey is in digital image watermarking hardware implementation, browsing of authors’ works through it will be classified into: • Chip implementation. • Digital camera implementation. 5.1. Chip Implementation Several watermarking algorithms have been proposed for securing digital image in the current literature. Here is a brief browsing of chips implementation to execute secure watermarking algorithms. Authors of [5, 6, 8,11] have implemented chips capable to execute successfully watermarking in spatial domain of the original image. In [6,11] authors have gently laid out full designs for digital image watermarking algorithms built on VLSI chips such as shown in figure (1). These designs have been implemented and tested by using different VLSI technologies. Design of the [6] developed hardware system that can insert both robust and fragile invisible watermark in the image. This design is built by depending on three algorithms taken from different authors [12-14]. The [12,13] are invisible-robust algorithms proposed by A. Tefas and I. Pitas, where the third one proposed by Mohanty and his work team in [14] for invisible-fragile algorithm. The results of [6] confirmed that the designed chip can perform invisible robust, invisible fragile watermarking and combination of both in spatial domain, and the chip can easily be integrated in any existing Joint Photographic Experts Group (JPEG) encoder to watermark the images right at the source end. The same authors have modified their works by using different algorithms for implementing two different visible watermarking schemes for images. These modifications are presented clearly in [15]. The chip which is designed in [11] implemented an Application Specific Integrated Circuit (ASIC) for digital color image watermarking. Here the RGB color image is transformed to YUV and intensity values of luminance are modified in spatial domain and transformed back to RGB. This operation has been implemented as a hardware scheme by converting a watermarking algorithm proposed in [16] by the same authors of [11]. This design has implemented in 0.13μm CMOS 6-metal technology. A new technology used in [5] called Single Electron Tunneling (SET) devices, where device size is very small and have ultra low power dissipation capabilities. Through [5] authors gave clear illustration for their algorithm and its implementation details. They have described SET based circuit operation and then illustrated the SET device based architecture for each unit. The results of that work denoted the low cost data embedding algorithm can conceal watermark into original image coming from a sensor much faster than software implementation and the embedded image is easily transmitted to PC by using proper interface. 92 Most popular and useful technology for implementing hardware designs is Field Programmable Gate Array (FPGA)1,Work of [8] has applied and tested successfully in FPGA (Xilinx ISE 10.1i) model. Full design for spatial domain watermark encoder and decoder has implemented in [8], whereby authors approved reliability of digital image hardware watermarking versus software one. Challenge of hardware digital image watermarking also includes frequency domain watermarking, such as the experiments which have done into [17] and [18]. For [17], authors presented the VLSI architecture of a watermarking chip and its implementation using TSMC 0.25- m CMOS technology. The chip is capable to insert both visible and invisible watermarks into an image. Dual-voltage, clock gating and dual-frequency techniques were used in that design for low power optimization along with a certain degree of pipelining and parallelism. The [17] authors believe that their design is the first hardware design with the capability to perform both visible and invisible watermarking in the DCT domain (at that time). Authors of [18] proposed a hardware/software co-design approach for the implementation of a DCTbased visible watermarking algorithm. They have designed their work by implementing the processes that demand high performance in hardware, while those that are not computationally expensive are implemented in software. As a result, power consumption is reduced since only portion of the algorithm is implemented in hardware. Their system was implemented on the Xilinx Virtex-II Pro Board, using the Xilinx Platform Studio (XPS). The design allows tradeoff between hardware and software implementation which is not present when a pure software or hardware is used. 5.2. Digital camera implementation A digital camera is a portable device to capture an image frame from scene and store it on the flash memory. An authentication digital camera is a camera with built-in copyright protection and security mechanism for images produced by it. [10,19,20] have presented various secure digital camera models. Hyun Lim and his team in [19] have proposed an FPGA implementation of a watermarking-based authentication algorithm for a digital camera to authenticate the captured image frame. Their experimental results showed that the FPGA implemented watermarking algorithm could embed the watermark into the captured image coming from a sensor much faster than the software-based implementation and the quality of an embedded image was also comparable to the one implemented by the software algorithm. This scheme consists of three main parts: image capture and LCD controller, watermark imbedding part, and camera control unit. Figure (2) shows the FPGA implementation block diagram of the proposed scheme. Fig. 2: The block diagram of an FPGA implementation for a secure digital camera in [19] 1 (FPGAs) are digital integrated circuits (ICs) that contain configurable blocks of logic along with configurable interconnects between these blocks. Design engineers can configure such devices to perform a tremendous variety of tasks [8]. 93 In [20] a prototype of a secure digital camera implementation for DCT based visible watermarking algorithm has proposed. This prototype consists of image sensor, A/D convertor, temporary memory, watermarking unit, controller unit, flash memory, and LCD panel. The authors in [20] focused their efforts to design and implement watermarking unit while the rest of the units of the camera are being carried out in their on-going research. In [10] DWT based implementation is used to develop a feasible and invisible watermark embedding hardware for the secure digital camera. The proposed scheme of the secure watermarking has described using Verilog HDL, and synthesized using 0.18µm technology UMS standard cell library for VLSI implementation. Authors have suggested a bind watermarking algorithm and then tested it using MATLAB before synthesis for hardware implementation. The algorithm has been evaluated under the various attacks like JPEG compression, noise, scaling and rotation to verify robustness and invisibility properties. 6. Analysis and Discussion Investigation of this survey proves that it is possible to have digital image watermarking in real time using hardware implementation. Also hardware implementation has occupied a valuable range of applications due to its economical features, in spite of the flexibility features of software implementation. Table (1) gives a summary of the proposed schemes which have been browsed in this survey. The first column recognizes the sequence of the schemes as mentioned during this paper and the symbol (-) indicates missing information which hasn’t mentioned by the authors in the specified scheme. 7. Conclusion Different hardware architectures for implementing secure watermarking algorithms proposed by different authors has discussed through this paper. These architectures have implemented by using different tools of VLSI technologies and they have achieved positive results. Great advantages are gained due to using hardware based implementation of watermarking algorithms, such as reduce hardware scheme area, decrease power consumption and increase speed of performance. Therefore a hardware watermarking solution is often more reliable and economical. Table 1: A Summarize of the Proposed Schemes. Proposed Scheme Domain Visibility Human Perception Chip/Camera Hardware Technology [6] Spatial Invisible Robust/Fragile Chip 0.35µmCMOS [15] Spatial Visible - Chip Hardware Simulation [11] Spatial - Fragile Chip 0.13µmCmos 6 metal DSM [5] Spatial Invisible Robust Chip SET devices [8] Spatial Invisible Robust Chip Xilinx Spartan (2s50tq144-6) [17] [18] DCT DCT Visible/ Invisible - Robust Chip Chip TSMC 0.25µm CMOS Xilinx Vertix-II [19] DCT - - Camera EP10K100ARC240-3 [20] DCT Visible - Camera Xilinx ISE 8.1i [10] DWT Invisible Robust Chip 0.18µm UMC Hardware Features -Low power -High performance -High performance -Low power -High performance -Small area -Low power -Small area -Low cost -Low power -Reliability -Real time -Low power -Low power -Low power -Small area -Low power -High performance -Small area -Low power -High performance -Small area 8. References [1] N. S. Kulkarni, I. Gupta, and S. N. Kulkarni. A Robust Image Encryption Technique based on Random Vector. In IEEE Computer Society. proc. of IEEE 1st International conference on Emerging Trends in Engineering and 94 Technology. 2008. pp.15-19. [2] C. Rey, and Jean-Luc Dugelay. A Survey of Watermarking Algorithms for Image Authentication. In EURASIP Journal on Applied Signal Processing. 2002. pp. 613–621. [3] J. Pan, H. C. Huang, and L. C. Jain. Intelligent Watermarking Techniques. World Scientific, 2004. [4] S. Jayaraman, S. Esakkirajan, and T. Veerakumar. Digital Image Processing. McGraw-Hill, 2009. [5] D. Samanta, A. Basu, T. S. Das, V. H. Mankar, A. Ghosh, M. Das, and S. K Sarkar. SET Based Logic Realization of a Robust Spatial Domain Image Watermarking. In IEEE(ICECE ). proc. of 5th International Conference on Electrical and Computer Engineering. Dhaka, Bangladesh. 2008. pp. 986-993. [6] S. P. Mohanty, N. Ranganathan, and R. K. Namballa, “VLSI Implementation of Invisible Digital Watermarking algorithms Towards the Developement of a Secure JPEG Encoder,” in Proc. of the IEEE Workshop on Signal Processing Systems, 2003, pp. 183-188. [7] N. J. Mathai, D. Kundur, and A. Sheikholeslami. Hardware Implementation Perspectives of Digital Video Watermarking Algorithms. In MATHAI et al.: Hardware Implementation Perspictives of Digital Video Watermarking Algorithms. Proc of IEEE Transaction on Signal Processing. 2003, 51(4): pp. 925-938. [8] A. Basu, T. S. Das, S. Maiti, N. Islam, and S. K. Sarkar. FPGA Based Implementation of Robust Spatial Domain Image Watermarking Algorithm. Proc. in International Conference on Computers and Devices for Communication. 2009. [9] A. Basu, T. Das, S. Sarkar, A. Roy and N. Islam. FPGA Prototype of Visual Information Hiding. IEEE. 2010. [10] A. Darji, A.N.Chandorkar, S.N. Merchant, and V. Mistry. VLSI Architecture of DWT based Watermark Encoder for Secure Still Digital Camera Design. In IEEE Computer Society. proc. of Third International Conference on Emerging Trends in Engineering and Technology. 2010.pp. 760-764. [11] A. Garimella, M. V. V. Satyanarayana, P.S. Murugesh, and U.C. Niranjan. ASIC for Digital Color Image Watermarking. proc. of IEEE 11th Digital Signal Processing Workshop and IEEE Signal Processing Education Workshop. 2004. pp. 292-296. [12] A. Tefas and 1. Pitas. Robust Spatial Image Watermarking Using Progressive Detection. proc. of lEEE International Conference on Acoustics, Speech. and Signal Processing. 2001.(vol. 3). pp. 1973-1976. [13] M. Barni F. Bartolini, A. Tefas and I. Pitas. Image authentication techniques for surveillance applications. proc. of IEEE. 2001, 89(10): pp. 1403-1418. [14] S. P. Mohanty, K. R. Ramakrishnan, and M. S. Kankanhalli. A Dual Watermarking Technique for Images. In proc. of 7th ACM International Multimedia Coifereiice (ACM-MM99) (part-2). 1999. pp. 49-51. [15] S.P. Mohanty, N. Ranganathan, and R.K. Namballa. A VLSI Architecture for Visible Watermarking in a Secure Still Digital Camera Design. proc. of IEEE Trans. on VLSI Systems. 2005. 13(8): pp.1-10. [16] A. Garimella, M.V.V. Satyanarayana, R.S. Kumar, P.S. Murugesh, and U.C. Niranjan, VLSI Implementation of Online Digital Watermarking Technique with Difference Encoding for 8-Bit Gray Scale Images. In Proc. IEEE 16th International Conference on VLSI Design. New Delhi, India. 2003. pp.283-288. [17] S.P. Mohanty, N. Ranganathan, and K. Balakrishnan. A dual Voltage-Frequency VLSI Chip for Image Processing in DCT Domain. proc. of IEEE Trans. on Circuits and Systems. 2006. 53(5): pp. 394-398. [18] Y. Morita, E. Ayeh, O.B. Adamo, and P. Guturu. Hardware/Software Co-design Approach for a DCT-Based Watermarking Algorithm. proc. of IEEE. 2009. pp. 683-686. [19] Hyun Lim, Soon-Young Park , Seong-Jun Kang, and Wan-Hyun Cho. FPGA implementation of Image Watermarking Algorithm for a Digital Camera. proc. of IEEE. 2003. pp. 1000-1003. [20] O. Adamo, S. P. Mohanty, and E. Kougianos. VLSI Architecture and FPGA Prototyping of a Digital Camera for Image Security and Authentication. proc. of IEEE. 2006. pp. 154-158. 95